Sciweavers

762 search results - page 101 / 153
» How to realize
Sort
View
SPW
2005
Springer
15 years 9 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
MM
2004
ACM
98views Multimedia» more  MM 2004»
15 years 9 months ago
Coordinated multi-streaming for 3D tele-immersion
This paper looks at the problem of multi-streaming in 3D teleimmersion and describes how a protocol architecture called CP (for Coordination Protocol) can be used to coordinate vi...
David E. Ott, Ketan Mayer-Patel
ECCV
2004
Springer
15 years 9 months ago
AQUATICS Reconstruction Software: The Design of a Diagnostic Tool Based on Computer Vision Algorithms
Computer vision methods can be applied to a variety of medical and surgical applications, and many techniques and algorithms are available that can be used to recover 3D shapes and...
Andrea Giachetti, Gianluigi Zanetti
TACAS
2004
Springer
111views Algorithms» more  TACAS 2004»
15 years 9 months ago
Automatic Creation of Environment Models via Training
Abstract. Model checking suffers not only from the state-space explosion problem, but also from the environment modeling problem: how can one create an accurate enough model of the...
Thomas Ball, Vladimir Levin, Fei Xie
CW
2003
IEEE
15 years 9 months ago
MASCARET: Pedagogical Multi-Agents System for Virtual Environment for Training
This study concerns virtual environments for training in operational conditions. The principal developed idea is that these environments are heterogeneous and open multi-agent sys...
Cedric Buche, Ronan Querrec, Pierre De Loor, Pierr...